top of page

                      Privacy Policy

Information We Collect

Cornerstone Tech Innovations LLC (“Cornerstone Tech,” “we,” “our,” or “us”) collects information that you voluntarily provide to us, including when you:

  • Submit a service request, quote form, or inquiry on our website

  • Contact us by phone, email, or through our support channels

  • Subscribe to newsletters, alerts, or marketing communications

  • Use our IT services, automation tools, or client support systems

We may also collect certain technical information automatically through cookies or analytics tools when you interact with our website.

How We Use Your Information

We use the information collected for purposes such as:

  • Delivering, managing, and improving our IT and cybersecurity services

  • Responding to questions, service requests, or technical support needs

  • Sending important updates, security notifications, and administrative messages

  • Enhancing user experience and understanding how our services are used

  • Fulfilling legal and regulatory obligations

  • Protecting the security and integrity of our systems, users, and business

Information Sharing

Cornerstone Tech does not sell or rent your personal information. We may disclose information only in the following circumstances:

  • With your permission or at your direction

  • To comply with laws, regulations, subpoenas, or valid legal requests

  • To protect our rights, property, systems, users, or the safety of others

  • To trusted third-party providers who assist in service delivery (e.g., cloud hosting, ticketing systems), provided they follow strict confidentiality and data protection requirements

  • As part of a corporate transaction, such as a merger, restructuring, or acquisition

All third-party vendors engaged by Cornerstone Tech are required to safeguard your information.

​

Data Security

​

Cornerstone Tech Innovations LLC employs a range of administrative, technical, and physical safeguards to protect your personal information. Our security measures may include:

  • Encryption (such as SSL/TLS) for secure data transmission

  • Restricted-access servers and secure infrastructure environments

  • Regular system updates, monitoring, and security assessments

  • Employee training programs focused on data protection and cybersecurity best practices

While we strive to maintain a high level of security, no system can be guaranteed to be completely secure.

 

Your Rights

 

Depending on your location and applicable privacy laws, you may have the right to:

  • Access and obtain a copy of the personal information we hold about you

  • Request corrections to inaccurate or incomplete information

  • Request deletion of your personal information, subject to legal or contractual limitations

  • Opt out of marketing or promotional communications at any time

  • File a complaint with regulatory or data protection authorities if you believe your rights have been violated

To exercise any of these rights, please contact us using the information provided in our Contact section.

bottom of page